I’m planning to deploy an internal app that has sensitive data. I suggested that we put it on a machine that isn’t exposed to the general internet, just our internal network. The I.T. department rejected this suggestion, saying it’s not worth it to set aside a whole machine for one application. (The app has its own domain in case that’s relevant, but I was told they can’t block requests based on the URL.)
Inside the app I programmed it to only respect requests if they come from an internal I.P. address, otherwise it just shows a page saying ‘you can’t look at this.’ Our internal addresses all have a distinct pattern, so I’m checking the request I.P. against a regex.
But I’m nervous about this strategy. It feels kind of janky to me. Is this reasonably secure?
IP filtering is better than nothing, but it’s got two problems:
IP addresses can be spoofed.
If an internal machine is compromised (that includes a client workstation, e.g. via installation of a Trojan), then the attacker can use that as a jump host or proxy to attack your system.
If this is really sensitive data, it doesn’t necessarily need a dedicated machine (though that is best practice), but you should at least authenticate your users somehow, and don’t run less sensitive (and more easily attacked) apps on the same machine.
And if it is truly sensitive, get a security professional in to review what you’re doing.
edit: incidentally, if you can, ditch the regex and use something like tcpwrappers or the firewalling features within the OS if it has any. Or, if you can have a different IP address for your app, use the firewall to block external access. (And if you have no firewall then you may as well give up and email your data to the attackers 🙂